instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2009-4496.
CVE ID: CVE-2009-4496 Date Updated: 2024-08-07T07:01:20.793Z Date Published: 2010-01-13T20:00:00 Description: Boa 0.94.14rc21 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041271.html - http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041274.html - http://secunia.com/advisories/39775 - http://www.securityfocus.com/bid/37718 - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt - http://www.vupen.com/english/advisories/2010/1133 - http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041285.html - http://www.securityfocus.com/archive/1/508830/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4999.
CVE ID: CVE-2010-4999 Date Updated: 2024-08-07T04:09:38.269Z Date Published: 2011-11-01T22:00:00 Description: SQL injection vulnerability in index.php in esoftpro Online Photo Pro 2.0 allows remote attackers to execute arbitrary SQL commands via the section parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/60040 - http://www.securityfocus.com/bid/41370 - http://www.exploit-db.com/exploits/14205 - http://www.vupen.com/english/advisories/2010/1698 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38307.
CVE ID: CVE-2023-38307 Date Updated: 2024-08-02T17:39:12.239Z Date Published: 2023-07-31T00:00:00 Description: An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Users and Groups functionality. The vulnerability occurs when an authenticated user adds a new user and inserts an XSS payload into the user's real name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://webmin.com/tags/webmin-changelog/ - https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38307 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41251.
CVE ID: CVE-2023-41251 Date Updated: 2024-08-02T18:54:04.541Z Date Published: 2024-07-08T15:22:24.889Z Description: A stack-based buffer overflow vulnerability exists in the boa formRoute functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1894 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-25642.
CVE ID: CVE-2023-25642 Date Updated: 2024-08-02T11:25:19.252Z Date Published: 2023-12-14T07:17:08.945Z Description: There is a buffer overflow vulnerability in some ZTE mobile internet producsts. Due to insufficient validation of tcp port parameter, an authenticated attacker could use the vulnerability to perform a denial of service attack.  No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032504 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-34516.
CVE ID: CVE-2021-34516 Date Updated: 2024-08-04T00:12:50.388Z Date Published: 2021-07-14T17:54:31 Description: Win32k Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34516 - https://www.zerodayinitiative.com/advisories/ZDI-21-895/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1019/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1005/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1017/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1006/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1008/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1007/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1021/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1009/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1018/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1004/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1020/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1016/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1022/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1015/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1011/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1010/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1013/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1014/ - https://www.zerodayinitiative.com/advisories/ZDI-21-1012/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38368.
CVE ID: CVE-2023-38368 Date Updated: 2024-08-24T10:48:57.321Z Date Published: 2024-06-27T18:25:39.896Z Description: IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 could disclose sensitive information to a local user to do improper permission controls. IBM X-Force ID: 261195. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7158790 - https://exchange.xforce.ibmcloud.com/vulnerabilities/261195 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6976.
CVE ID: CVE-2016-6976 Date Updated: 2024-08-06T01:50:46.069Z Date Published: 2016-10-13T19:00:00 Description: Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1036986 - https://helpx.adobe.com/security/products/acrobat/apsb16-33.html - http://www.securityfocus.com/bid/93496 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3959.
CVE ID: CVE-2015-3959 Date Updated: 2024-08-06T06:04:01.149Z Date Published: 2015-08-04T01:00:00 Description: The firmware in MNS before 4.5.6 on Belden GarrettCom Magnum 6K and Magnum 10K switches has a hardcoded serial-console password for a privileged account, which might allow physically proximate attackers to obtain access by establishing a console session to a nonstandard installation on which this account is enabled, and leveraging knowledge of this password. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/75235 - http://www.garrettcom.com/techsupport/MNS6K_R456_Release_Notes.pdf - https://ics-cert.us-cert.gov/advisories/ICSA-15-167-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3766.
CVE ID: CVE-2012-3766 Date Updated: 2023-09-14T18:40:21.207Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6979.
CVE ID: CVE-2014-6979 Date Updated: 2024-08-06T12:31:47.306Z Date Published: 2014-10-16T19:00:00 Description: The MiWay Insurance Ltd (aka com.MiWay.MD) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/714145 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2129.
CVE ID: CVE-2022-2129 Date Updated: 2024-08-03T00:24:44.278Z Date Published: 2022-06-19T00:00:00 Description: Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352 - https://github.com/vim/vim/commit/d6211a52ab9f53b82f884561ed43d2fe4d24ff7d - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/ - https://security.gentoo.org/glsa/202208-32 - https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html - https://security.gentoo.org/glsa/202305-16 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5191.
CVE ID: CVE-2014-5191 Date Updated: 2024-08-06T11:34:37.519Z Date Published: 2014-08-07T10:00:00 Description: Cross-site scripting (XSS) vulnerability in the Preview plugin before 4.4.3 in CKEditor allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://ckeditor.com/node/136981 - http://secunia.com/advisories/60036 - http://www.securityfocus.com/bid/69161 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13580.
CVE ID: CVE-2018-13580 Date Updated: 2024-08-05T09:07:52.162Z Date Published: 2018-07-09T06:00:00 Description: The mintToken function of a smart contract implementation for ProvidenceCasino (PVE), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/BlockChainsSecurity/EtherTokens/tree/master/PVE - https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-10430.
CVE ID: CVE-2020-10430 Date Updated: 2024-08-04T10:58:40.581Z Date Published: 2020-03-12T13:04:36 Description: The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-subscribers.php by adding a question mark (?) followed by the payload. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://antoniocannito.it/?p=137#uxss - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18716.
CVE ID: CVE-2017-18716 Date Updated: 2024-08-05T21:37:42.615Z Date Published: 2020-04-24T13:30:25 Description: Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6200 before 1.1.00.24, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000052281/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Routers-PSV-2017-2156 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5336.
CVE ID: CVE-2008-5336 Date Updated: 2024-08-07T10:49:12.431Z Date Published: 2008-12-05T01:00:00 Description: SQL injection vulnerability in index.php in WebStudio CMS allows remote attackers to execute arbitrary SQL commands via the pageid parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2008/3273 - https://www.exploit-db.com/exploits/7236 - http://securityreason.com/securityalert/4690 - http://www.securityfocus.com/bid/32449 - http://www.securityfocus.com/archive/1/498597/100/0/threaded - https://exchange.xforce.ibmcloud.com/vulnerabilities/46818 - https://www.exploit-db.com/exploits/7216 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-42239.
CVE ID: CVE-2024-42239 Date Updated: 2024-09-11T17:34:31.803Z Date Published: 2024-08-07T15:14:27.382Z Description: In the Linux kernel, the following vulnerability has been resolved: bpf: Fail bpf_timer_cancel when callback is being cancelled Given a schedule: timer1 cb timer2 cb bpf_timer_cancel(timer2); bpf_timer_cancel(timer1); Both bpf_timer_cancel calls would wait for the other callback to finish executing, introducing a lockup. Add an atomic_t count named 'cancelling' in bpf_hrtimer. This keeps track of all in-flight cancellation requests for a given BPF timer. Whenever cancelling a BPF timer, we must check if we have outstanding cancellation requests, and if so, we must fail the operation with an error (-EDEADLK) since cancellation is synchronous and waits for the callback to finish executing. This implies that we can enter a deadlock situation involving two or more timer callbacks executing in parallel and attempting to cancel one another. Note that we avoid incrementing the cancelling counter for the target timer (the one being cancelled) if bpf_timer_cancel is not invoked from a callback, to avoid spurious errors. The whole point of detecting cur->cancelling and returning -EDEADLK is to not enter a busy wait loop (which may or may not lead to a lockup). This does not apply in case the caller is in a non-callback context, the other side can continue to cancel as it sees fit without running into errors. Background on prior attempts: Earlier versions of this patch used a bool 'cancelling' bit and used the following pattern under timer->lock to publish cancellation status. lock(t->lock); t->cancelling = true; mb(); if (cur->cancelling) return -EDEADLK; unlock(t->lock); hrtimer_cancel(t->timer); t->cancelling = false; The store outside the critical section could overwrite a parallel requests t->cancelling assignment to true, to ensure the parallely executing callback observes its cancellation status. It would be necessary to clear this cancelling bit once hrtimer_cancel is done, but lack of serialization introduced races. Another option was explored where bpf_timer_start would clear the bit when (re)starting the timer under timer->lock. This would ensure serialized access to the cancelling bit, but may allow it to be cleared before in-flight hrtimer_cancel has finished executing, such that lockups can occur again. Thus, we choose an atomic counter to keep track of all outstanding cancellation requests and use it to prevent lockups in case callbacks attempt to cancel each other while executing in parallel. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/9369830518688ecd5b08ffc08ab3302ce2b5d0f7 - https://git.kernel.org/stable/c/3e4e8178a8666c56813bd167b848fca0f4c9af0a - https://git.kernel.org/stable/c/d4523831f07a267a943f0dde844bf8ead7495f13 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41714.
CVE ID: CVE-2021-41714 Date Updated: 2024-08-04T03:15:29.271Z Date Published: 2022-05-23T15:34:34 Description: In Tipask < 3.5.9, path parameters entered by the user are not validated when downloading attachments, a registered user can download arbitrary files on the Tipask server such as .env, /etc/passwd, laravel.log, causing infomation leakage. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.yuque.com/henry-weply/penetration/fza5hm - https://github.com/sdfsky/tipask/blob/c4e6aa9f6017c9664780570016954c0922d203b7/app/Http/Controllers/AttachController.php#L42 - https://github.com/sdfsky/tipask/commit/9b5f13d1708e9a5dc0959cb8a97be1c32b94ca69 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-5103.
CVE ID: CVE-2011-5103 Date Updated: 2024-08-07T00:23:40.206Z Date Published: 2012-08-23T20:00:00 Description: SQL injection vulnerability in Alurian Prismotube PHP Video Script allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/18156 - http://www.securityfocus.com/bid/50815 - https://exchange.xforce.ibmcloud.com/vulnerabilities/71481 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11027.
CVE ID: CVE-2017-11027 Date Updated: 2024-09-16T23:11:44.476Z Date Published: 2017-11-16T22:00:00Z Description: In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while flashing UBI image, size is not validated for being smaller than minimum header size causing unintialized data access vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2017-11-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20872.
CVE ID: CVE-2018-20872 Date Updated: 2024-08-05T12:12:29.584Z Date Published: 2019-07-31T17:11:25 Description: DrayTek routers before 2018-05-23 allow CSRF attacks to change DNS or DHCP settings, a related issue to CVE-2017-11649. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.draytek.com/about/security-advisory/urgent-security-updates-to-draytek-routers No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2326.
CVE ID: CVE-2012-2326 Date Updated: 2024-09-16T16:37:30.858Z Date Published: 2012-08-13T18:00:00Z Description: Cross-site scripting (XSS) vulnerability in the Admin Control Panel (ACP) in MyBB (aka MyBulletinBoard) before 1.6.7 allows remote administrators to inject arbitrary web script or HTML via a malformed file name in an orphaned attachment. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/53417 - http://www.openwall.com/lists/oss-security/2012/05/07/13 - http://blog.mybb.com/2012/04/01/mybb-1-6-7-update-1-8-development/ - http://www.openwall.com/lists/oss-security/2012/05/07/14 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3205.
CVE ID: CVE-2013-3205 Date Updated: 2024-08-06T16:00:10.157Z Date Published: 2013-09-11T10:00:00 Description: Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-069 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18696 - http://www.us-cert.gov/ncas/alerts/TA13-253A No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2139.
CVE ID: CVE-2017-2139 Date Updated: 2024-08-05T13:39:32.360Z Date Published: 2017-04-28T16:00:00 Description: CS-Cart Japanese Edition v4.3.10 and earlier (excluding v2 and v3), CS-Cart Multivendor Japanese Edition v4.3.10 and earlier (excluding v2 and v3) allows remote attackers to bypass access restriction to obtain customer information via orders.pre.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://jvn.jp/en/jp/JVN14396697/index.html - http://tips.cs-cart.jp/fix-jvn-14396697.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0582.
CVE ID: CVE-2023-0582 Date Updated: 2024-08-02T05:17:50.097Z Date Published: 2024-03-27T17:09:43.769Z Description: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ForgeRock Access Management allows Authorization Bypass. This issue affects access management: before 7.3.0, before 7.2.1, before 7.1.4, through 7.0.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://backstage.forgerock.com/downloads/browse/am/featured - https://backstage.forgerock.com/knowledge/kb/article/a64088600 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4952.
CVE ID: CVE-2018-4952 Date Updated: 2024-08-05T05:18:27.042Z Date Published: 2018-07-09T19:00:00 Description: Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/104169 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html - http://www.securitytracker.com/id/1040920 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2014-0324
CVE-CVE-2014-0324 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1203: Exploitation for Client Execution. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2014 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2020-26914.
CVE ID: CVE-2020-26914 Date Updated: 2024-08-04T16:03:22.853Z Date Published: 2020-10-09T06:30:48 Description: Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000062339/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0014 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11346.
CVE ID: CVE-2018-11346 Date Updated: 2024-08-05T08:01:53.000Z Date Published: 2018-05-22T01:00:00 Description: An insecure direct object reference vulnerability in download.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows the ability to reference the "download_sys_settings" action and then specify files arbitrarily throughout the system via the act parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.purehacking.com/blog/matthew-fulton/back-to-the-future-asustor-web-exploitation - https://github.com/mefulton/asustorexploit - http://seclists.org/fulldisclosure/2018/May/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-2672.
CVE ID: CVE-2020-2672 Date Updated: 2024-09-30T15:56:25.624Z Date Published: 2020-01-15T16:34:06 Description: Vulnerability in the Oracle Email Center product of Oracle E-Business Suite (component: Message Display). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Email Center. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or delete access to some of Oracle Email Center accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujan2020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T0812
The MITRE ATT&CK technique T0812: Default Credentials is related to the vulnerability CVE-CVE-2018-14847. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2017-4810.
CVE ID: CVE-2017-4810 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1174.
CVE ID: CVE-2020-1174 Date Updated: 2024-08-04T06:25:01.255Z Date Published: 2020-05-21T22:53:31 Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1051, CVE-2020-1175, CVE-2020-1176. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1174 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2014-9938
CVE-CVE-2014-9938 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1059.004: Unix Shell. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2014 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2023-34090.
CVE ID: CVE-2023-34090 Date Updated: 2024-08-02T16:01:53.423Z Date Published: 2023-07-11T17:29:36.629Z Description: Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. Decidim uses a third-party library named Ransack for filtering certain database collections (e.g., public meetings). By default, this library allows filtering on all data attributes and associations. This allows an unauthenticated remote attacker to exfiltrate non-public data from the underlying database of a Decidim instance (e.g., exfiltrating data from the user table). This issue may lead to Sensitive Data Disclosure. The problem was patched in version 0.27.3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/decidim/decidim/security/advisories/GHSA-jm79-9pm4-vrw9 - https://github.com/decidim/decidim/security/advisories/GHSA-jm79-9pm4-vrw9#advisory-comment-81110 - https://github.com/decidim/decidim/releases/tag/v0.27.3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20503.
CVE ID: CVE-2021-20503 Date Updated: 2024-09-17T04:09:00.087Z Date Published: 2021-03-30T16:45:31.424642Z Description: IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 198182. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6437579 - https://exchange.xforce.ibmcloud.com/vulnerabilities/198182 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6905.
CVE ID: CVE-2008-6905 Date Updated: 2024-08-07T11:49:02.410Z Date Published: 2009-08-06T17:00:00 Description: Cross-site request forgery (CSRF) vulnerability in index.php in BabbleBoard 1.1.6 allows remote authenticated users to hijack the authentication of administrators for requests that delete (1) categories or (2) groups; (3) ban users; or (4) delete users via the admin page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/33174 - http://osvdb.org/50721 - https://www.exploit-db.com/exploits/7475 - https://exchange.xforce.ibmcloud.com/vulnerabilities/47396 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46909.
CVE ID: CVE-2021-46909 Date Updated: 2024-08-04T05:17:42.879Z Date Published: 2024-02-27T06:53:50.181Z Description: In the Linux kernel, the following vulnerability has been resolved: ARM: footbridge: fix PCI interrupt mapping Since commit 30fdfb929e82 ("PCI: Add a call to pci_assign_irq() in pci_device_probe()"), the PCI code will call the IRQ mapping function whenever a PCI driver is probed. If these are marked as __init, this causes an oops if a PCI driver is loaded or bound after the kernel has initialised. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf - https://git.kernel.org/stable/c/2643da6aa57920d9159a1a579fb04f89a2b0d29a - https://git.kernel.org/stable/c/871b569a3e67f570df9f5ba195444dc7c621293b - https://git.kernel.org/stable/c/1fc087fdb98d556b416c82ed6e3964a30885f47a - https://git.kernel.org/stable/c/c3efce8cc9807339633ee30e39882f4c8626ee1d - https://git.kernel.org/stable/c/30e3b4f256b4e366a61658c294f6a21b8626dda7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1542.001
The MITRE ATT&CK technique T1542.001: System Firmware is related to the vulnerability CVE-CVE-2020-5376. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as primary_impact.
Provide detailed information about CVE-2017-6869.
CVE ID: CVE-2017-6869 Date Updated: 2024-08-05T15:41:17.699Z Date Published: 2017-08-08T00:00:00 Description: A vulnerability was discovered in Siemens ViewPort for Web Office Portal before revision number 1453 that could allow an unauthenticated remote user to upload arbitrary code and execute it with the permissions of the operating-system user running the web server by sending specially crafted network packets to port 443/TCP or port 80/TCP. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/99343 - https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-545214.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-5005.
CVE ID: CVE-2009-5005 Date Updated: 2024-08-07T07:24:53.868Z Date Published: 2010-10-18T16:00:00Z Description: The Cluster::deliveredEvent function in cluster/Cluster.cpp in Apache Qpid, as used in Red Hat Enterprise MRG before 1.3 and other products, allows remote attackers to cause a denial of service (daemon crash and cluster outage) via invalid AMQP data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://rhn.redhat.com/errata/RHSA-2010-0774.html - https://bugzilla.redhat.com/show_bug.cgi?id=642373 - http://www.vupen.com/english/advisories/2010/2684 - http://svn.apache.org/viewvc?revision=785788&view=revision - http://secunia.com/advisories/41812 - http://secunia.com/advisories/41710 - https://rhn.redhat.com/errata/RHSA-2010-0773.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0114.
CVE ID: CVE-2020-0114 Date Updated: 2024-08-04T05:47:40.682Z Date Published: 2020-06-10T17:10:57 Description: In onCreateSliceProvider of KeyguardSliceProvider.java, there is a possible confused deputy due to a PendingIntent error. This could lead to local escalation of privilege that allows actions performed as the System UI, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-147606347 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2020-06-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-24789.
CVE ID: CVE-2023-24789 Date Updated: 2024-08-02T11:03:19.358Z Date Published: 2023-03-06T00:00:00 Description: jeecg-boot v3.4.4 was discovered to contain an authenticated SQL injection vulnerability via the building block report component. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jeecgboot/jeecg-boot/issues/4511 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5670.
CVE ID: CVE-2015-5670 Date Updated: 2024-08-06T06:59:03.644Z Date Published: 2015-10-29T10:00:00 Description: Cross-site scripting (XSS) vulnerability in Techno Project Japan Enisys Gw before 1.4.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://jvndb.jvn.jp/jvndb/JVNDB-2015-000169 - http://www.tpj.co.jp/enisys/resource.html - http://jvn.jp/en/jp/JVN13874649/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0435.
CVE ID: CVE-2015-0435 Date Updated: 2024-08-06T04:10:10.496Z Date Published: 2015-01-21T19:00:00 Description: Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.1, 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, and 6.3.5 allows remote authenticated users to affect confidentiality via unknown vectors related to Security. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html - http://secunia.com/advisories/62506 - http://www.securitytracker.com/id/1031576 - http://www.securityfocus.com/bid/72122 - https://exchange.xforce.ibmcloud.com/vulnerabilities/100104 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22997.
CVE ID: CVE-2021-22997 Date Updated: 2024-08-03T18:58:26.127Z Date Published: 2021-03-31T17:35:54 Description: On all 7.x and 6.x versions (fixed in 8.0.0), BIG-IQ HA ElasticSearch service does not implement any form of authentication for the clustering transport services, and all data used by ElasticSearch for transport is unencrypted. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.f5.com/csp/article/K34074377 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9907.
CVE ID: CVE-2014-9907 Date Updated: 2024-08-06T14:02:36.615Z Date Published: 2017-04-19T14:00:00 Description: coders/dds.c in ImageMagick allows remote attackers to cause a denial of service via a crafted DDS file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2016/09/22/2 - https://bugzilla.redhat.com/show_bug.cgi?id=1378734 - https://github.com/ImageMagick/ImageMagick/commit/504ada82b6fa38a30c846c1c29116af7290decb2 - http://www.securityfocus.com/bid/93231 - https://github.com/ImageMagick/ImageMagick/commit/21eae25a8db5fdcd112dbcfcd9e5c37e32d32e2f - https://github.com/ImageMagick/ImageMagick/commit/d7325bac173492b358417a0ad49fabad44447d52 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-25779.
CVE ID: CVE-2020-25779 Date Updated: 2024-08-04T15:40:36.956Z Date Published: 2020-10-13T15:45:15 Description: Trend Micro Antivirus for Mac 2020 (Consumer) has a vulnerability in which a Internationalized Domain Name homograph attack (Puny-code) could be used to add a malicious website to the approved websites list of Trend Micro Antivirus for Mac to bypass the web threat protection feature. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpcenter.trendmicro.com/en-us/article/TMKA-09949 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0190.
CVE ID: CVE-2014-0190 Date Updated: 2024-08-06T09:05:39.205Z Date Published: 2014-05-08T14:00:00 Description: The GIF decoder in QtGui in Qt before 5.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via invalid width and height values in a GIF image. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.kde.org/show_bug.cgi?id=333404 - http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html - http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134040.html - http://www.ubuntu.com/usn/USN-2626-1 - http://lists.qt-project.org/pipermail/announce/2014-April/000045.html - http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134141.html - http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132395.html - http://www.securityfocus.com/bid/67087 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3929.
CVE ID: CVE-2024-3929 Date Updated: 2024-08-01T20:26:57.105Z Date Published: 2024-04-25T07:33:58.101Z Description: The Content Views – Post Grid & Filter, Recent Posts, Category Posts, & More (Gutenberg Blocks and Shortcode) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Widget Post Overlay block in all versions up to, and including, 3.7.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/5666da4a-ffb6-47ed-8b48-a80f09dd2501?source=cve - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3074758%40content-views-query-and-display-post-page&new=3074758%40content-views-query-and-display-post-page&sfp_email=&sfph_mail= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28466.
CVE ID: CVE-2023-28466 Date Updated: 2024-08-02T12:38:25.383Z Date Published: 2023-03-15T00:00:00 Description: do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962 - https://security.netapp.com/advisory/ntap-20230427-0006/ - https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-45004.
CVE ID: CVE-2023-45004 Date Updated: 2024-09-13T18:04:44.394Z Date Published: 2023-10-17T11:05:54.452Z Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in wp3sixty Woo Custom Emails plugin <= 2.2 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/woo-custom-emails/wordpress-woo-custom-emails-plugin-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1904.
CVE ID: CVE-2019-1904 Date Updated: 2024-08-04T18:35:52.014Z Date Published: 2019-06-21T02:20:12 Description: A vulnerability in the web-based UI (web UI) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web UI on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or reload an affected device. This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS XE Software with the HTTP Server feature enabled. The default state of the HTTP Server feature is version dependent. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190612-iosxe-csrf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-0759.
CVE ID: CVE-2022-0759 Date Updated: 2024-08-02T23:40:03.643Z Date Published: 2022-03-25T18:03:10 Description: A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ManageIQ/kubeclient/issues/554 - https://github.com/ManageIQ/kubeclient/issues/555 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3466.
CVE ID: CVE-2011-3466 Date Updated: 2023-09-14T18:40:12.656Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1593.
CVE ID: CVE-2023-1593 Date Updated: 2024-08-02T05:57:25.007Z Date Published: 2023-03-23T10:00:04.927Z Description: A vulnerability, which was classified as problematic, has been found in SourceCodester Automatic Question Paper Generator System 1.0. This issue affects some unknown processing of the file classes/Master.php?f=save_class. The manipulation of the argument description leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-223661 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.223661 - https://vuldb.com/?ctiid.223661 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-6209.
CVE ID: CVE-2017-6209 Date Updated: 2024-08-05T15:25:48.535Z Date Published: 2017-03-15T14:00:00 Description: Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201707-06 - https://lists.freedesktop.org/archives/virglrenderer-devel/2017-February/000145.html - https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27 - http://www.securityfocus.com/bid/96437 - http://www.openwall.com/lists/oss-security/2017/02/23/20 - https://bugzilla.redhat.com/show_bug.cgi?id=1426149 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5547.
CVE ID: CVE-2008-5547 Date Updated: 2024-08-07T10:56:47.174Z Date Published: 2008-12-12T18:13:00 Description: HAURI ViRobot 2008.12.4.1499 and possibly 2008.9.12.1375, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/47435 - http://securityreason.com/securityalert/4723 - http://www.securityfocus.com/archive/1/499043/100/0/threaded - http://www.securityfocus.com/archive/1/498995/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38781.
CVE ID: CVE-2024-38781 Date Updated: 2024-08-02T04:19:20.290Z Date Published: 2024-07-21T21:15:36.446Z Description: Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ArtistScope CopySafe Web Protection allows Reflected XSS.This issue affects CopySafe Web Protection: from n/a through 3.15. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/wp-copysafe-web/wordpress-copysafe-web-protection-plugin-3-15-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-8574.
CVE ID: CVE-2024-8574 Date Updated: 2024-09-10T14:47:43.829Z Date Published: 2024-09-08T11:00:06.220Z Description: A vulnerability has been found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220 and classified as critical. This vulnerability affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument slaveIpList leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.276808 - https://vuldb.com/?ctiid.276808 - https://vuldb.com/?submit.401289 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setUpgradeFW.md - https://www.totolink.net/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1503.
CVE ID: CVE-2012-1503 Date Updated: 2024-08-06T19:01:02.557Z Date Published: 2014-08-29T14:00:00 Description: Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/22151 - http://osvdb.org/show/osvdb/86729 - http://www.cloudscan.me/2012/10/cve-2012-1503-movable-type-pro-513en.html - http://www.securityfocus.com/bid/56160 - https://exchange.xforce.ibmcloud.com/vulnerabilities/79521 - http://packetstormsecurity.org/files/117564/Movable-Type-Pro-5.13en-Cross-Site-Scripting.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3960.
CVE ID: CVE-2014-3960 Date Updated: 2024-09-17T00:20:54.889Z Date Published: 2014-06-04T14:00:00Z Description: Multiple cross-site scripting (XSS) vulnerabilities in OpenNMS before 1.12.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.opennms.org/documentation/ReleaseNotesStable.html#opennms-1.12.7 - http://www.securityfocus.com/bid/67774 - http://secunia.com/advisories/58748 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2745.
CVE ID: CVE-2023-2745 Date Updated: 2024-08-02T06:33:05.433Z Date Published: 2023-05-17T08:36:44.034Z Description: WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve - https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/ - https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail= - http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html - https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide information about the following MITRE ATT&CK technique:
T1587.002 : Code Signing Certificates
Name: Code Signing Certificates ID: T1587.002 URL: https://attack.mitre.org/techniques/T1587/002 Platforms: PRE Kill Chain Phases: Resource Development Description: Adversaries may create self-signed code signing certificates that can be used during targeting. Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted. Code signing provides a level of authenticity for a program from the developer and a guarantee that the program has not been tampered with.(Citation: Wikipedia Code Signing) Users and/or security tools may trust a signed piece of code more than an unsigned piece of code even if they don't know who issued the certificate or who the author is. Prior to [Code Signing](T1553.002), adversaries may develop self-signed code signing certificates for use in operations. Data Sources: Malware Repository: Malware Metadata Detection: Consider analyzing self-signed code signing certificates for features that may be associated with the adversary and/or their developers, such as the thumbprint, algorithm used, validity period, and common name. Malware repositories can also be used to identify additional samples associated with the adversary and identify patterns an adversary has used in crafting self-signed code signing certificates. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related follow-on behavior, such as [Code Signing](T1553.002) or [Install Root Certificate](T1553.004).
null
Describe the MITRE ATT&CK technique T1203
The MITRE ATT&CK technique T1203: Exploitation for Client Execution is related to the vulnerability CVE-CVE-2014-7187. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2022-35375.
CVE ID: CVE-2022-35375 Date Updated: 2022-07-11T19:40:24 Date Published: 2022-07-11T19:40:24 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-14842.
CVE ID: CVE-2020-14842 Date Updated: 2024-09-26T20:12:48.479Z Date Published: 2020-10-21T14:04:28 Description: Vulnerability in the BI Publisher product of Oracle Fusion Middleware (component: BI Publisher Security). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in BI Publisher, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all BI Publisher accessible data as well as unauthorized update, insert or delete access to some of BI Publisher accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuoct2020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-45505.
CVE ID: CVE-2022-45505 Date Updated: 2024-08-03T14:17:03.494Z Date Published: 2022-12-08T00:00:00 Description: Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the cmdinput parameter at /goform/exeCommand. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/exeCommand/readme.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1567.
CVE ID: CVE-2009-1567 Date Updated: 2024-08-07T05:20:34.218Z Date Published: 2009-12-03T17:00:00 Description: Multiple stack-based buffer overflows in the Lateral Arts Photobox uploader ActiveX control 1.x before 1.3, and 2.2.0.6, allow remote attackers to execute arbitrary code via a long URL string for the (1) LogURL, (2) ConnectURL, (3) SkinURL, (4) AlbumCreateURL, (5) ErrorURL, or (6) httpsinglehost property value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/37187 - http://secunia.com/advisories/37492 - http://secunia.com/secunia_research/2009-41/ - http://www.vupen.com/english/advisories/2009/3377 - http://secunia.com/advisories/37138 - http://www.vupen.com/english/advisories/2009/3376 - http://www.securityfocus.com/archive/1/508169/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10933.
CVE ID: CVE-2018-10933 Date Updated: 2024-08-05T07:54:35.801Z Date Published: 2018-10-17T12:00:00 Description: A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://usn.ubuntu.com/3795-1/ - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - https://usn.ubuntu.com/3795-2/ - https://www.debian.org/security/2018/dsa-4322 - https://www.exploit-db.com/exploits/45638/ - https://www.libssh.org/security/advisories/CVE-2018-10933.txt - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933 - http://www.securityfocus.com/bid/105677 - https://lists.debian.org/debian-lts-announce/2018/10/msg00010.html - https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016 - https://security.netapp.com/advisory/ntap-20190118-0002/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0824.
CVE ID: CVE-2008-0824 Date Updated: 2024-09-16T17:29:06.210Z Date Published: 2008-02-19T20:00:00Z Description: Unspecified vulnerability in the php2phps function in Claroline before 1.8.9 has unknown impact and attack vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://sourceforge.net/project/shownotes.php?release_id=575934 - http://secunia.com/advisories/28942 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16330.
CVE ID: CVE-2019-16330 Date Updated: 2024-08-05T01:10:41.658Z Date Published: 2019-10-17T16:55:11 Description: In NCH Express Accounts Accounting v7.02, persistent cross site scripting (XSS) exists in Invoices/Sales Orders/Items/Customers/Quotes input field. An authenticated unprivileged user can add/modify the Invoices/Sales Orders/Items/Customers/Quotes fields parameter to inject arbitrary JavaScript. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/47505 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43539.
CVE ID: CVE-2022-43539 Date Updated: 2024-08-03T13:32:59.646Z Date Published: 2023-01-03T20:07:05.704Z Description: A vulnerability exists in the ClearPass Policy Manager cluster communications that allow for an attacker in a privileged network position to potentially obtain sensitive information. A successful exploit could allow an attacker to retrieve information that allows for unauthorized actions as a privileged user on the ClearPass Policy Manager cluster in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-020.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41646.
CVE ID: CVE-2022-41646 Date Updated: 2024-08-03T12:49:43.450Z Date Published: 2023-05-10T13:16:53.379Z Description: Insufficient control flow management in the Intel(R) IPP Cryptography software before version 2021.6 may allow an unauthenticated user to potentially enable information disclosure via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00788.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14012.
CVE ID: CVE-2019-14012 Date Updated: 2024-08-05T00:05:44.202Z Date Published: 2020-04-16T10:46:10 Description: Possibility of null pointer deference as the array of video codecs from media info is referenced without null checking while processing SDP messages in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, Nicobar, QCM2150, QM215, Rennell, SC7180, SC8180X, SDA845, SDM429, SDM439, SDM450, SDM632, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43721.
CVE ID: CVE-2022-43721 Date Updated: 2024-08-03T13:40:06.461Z Date Published: 2023-01-16T10:10:52.583Z Description: An authenticated attacker with update datasets permission could change a dataset link to an untrusted site, users could be redirected to this site when clicking on that specific dataset. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread/s6sqt5jmcv6qxtvdot1t5tpt57v439kg No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-43502.
CVE ID: CVE-2023-43502 Date Updated: 2024-09-24T18:25:43.344Z Date Published: 2023-09-20T16:06:13.513Z Description: A cross-site request forgery (CSRF) vulnerability in Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier allows attackers to delete Failure Causes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3239 - http://www.openwall.com/lists/oss-security/2023/09/20/5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3622.
CVE ID: CVE-2018-3622 Date Updated: 2023-03-03T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8391.
CVE ID: CVE-2014-8391 Date Updated: 2024-08-06T13:18:48.188Z Date Published: 2015-06-02T14:00:00 Description: The Web interface in Sendio before 7.2.4 does not properly handle sessions, which allows remote authenticated users to obtain sensitive information from other users' sessions via a large number of requests. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2015/May/95 - http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html - http://www.securityfocus.com/archive/1/535592/100/0/threaded - https://www.exploit-db.com/exploits/37114/ - http://www.sendio.com/software-release-history/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-3172.
CVE ID: CVE-2021-3172 Date Updated: 2024-08-03T16:45:51.361Z Date Published: 2023-02-17T00:00:00 Description: An issue in Php-Fusion v9.03.90 fixed in v9.10.00 allows authenticated attackers to cause a Distributed Denial of Service via the Polling feature. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/PHPFusion/PHPFusion/issues/2351 - https://github.com/PHPFusion/PHPFusion/commit/7b8df6925cc7cfd8585d4f34d9120ff3a2e5753e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0127.
CVE ID: CVE-2023-0127 Date Updated: 2024-08-02T05:02:43.781Z Date Published: 2023-02-11T00:00:00 Description: A command injection vulnerability in the firmware_update command, in the device's restricted telnet interface, allows an authenticated attacker to execute arbitrary commands as root. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2023-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-16024.
CVE ID: CVE-2018-16024 Date Updated: 2024-08-05T10:10:05.683Z Date Published: 2019-01-18T17:00:00 Description: Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/106162 - https://helpx.adobe.com/security/products/acrobat/apsb18-41.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4310.
CVE ID: CVE-2008-4310 Date Updated: 2024-08-07T10:08:35.153Z Date Published: 2008-12-09T00:00:00 Description: httputils.rb in WEBrick in Ruby 1.8.1 and 1.8.5, as used in Red Hat Enterprise Linux 4 and 5, allows remote attackers to cause a denial of service (CPU consumption) via a crafted HTTP request. NOTE: this issue exists because of an incomplete fix for CVE-2008-3656. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.redhat.com/support/errata/RHSA-2008-0981.html - https://bugzilla.redhat.com/show_bug.cgi?id=470252 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10250 - http://www.openwall.com/lists/oss-security/2008/12/04/2 - http://secunia.com/advisories/33013 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6488.
CVE ID: CVE-2008-6488 Date Updated: 2024-08-07T11:34:47.000Z Date Published: 2009-03-18T15:00:00 Description: SQL injection vulnerability in index.php in SoftComplex PHP Image Gallery 1.0 allows remote attackers to execute arbitrary SQL commands via the Admin field in a login action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/7021 - https://exchange.xforce.ibmcloud.com/vulnerabilities/49337 - http://www.securityfocus.com/bid/32159 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5234.
CVE ID: CVE-2008-5234 Date Updated: 2024-08-07T10:49:12.285Z Date Published: 2008-11-26T01:00:00 Description: Multiple heap-based buffer overflows in xine-lib 1.1.12, and other versions before 1.1.15, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted metadata atom size processed by the parse_moov_atom function in demux_qt.c and (2) frame reading in the id3v23_interp_frame function in id3.c. NOTE: as of 20081122, it is possible that vector 1 has not been fixed in 1.1.15. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/30797 - http://securitytracker.com/id?1020703 - https://exchange.xforce.ibmcloud.com/vulnerabilities/44633 - http://secunia.com/advisories/33544 - http://www.ocert.org/analysis/2008-008/analysis.txt - http://securityreason.com/securityalert/4648 - http://secunia.com/advisories/31827 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html - http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html - http://secunia.com/advisories/31502 - https://exchange.xforce.ibmcloud.com/vulnerabilities/44647 - http://www.vupen.com/english/advisories/2008/2382 - http://www.securityfocus.com/archive/1/495674/100/0/threaded - http://www.mandriva.com/security/advisories?name=MDVSA-2009:020 - https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html - http://sourceforge.net/project/shownotes.php?release_id=619869 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-24081.
CVE ID: CVE-2023-24081 Date Updated: 2024-08-02T10:49:09.031Z Date Published: 2023-02-21T00:00:00 Description: Multiple stored cross-site scripting (XSS) vulnerabilities in Redrock Software TutorTrac before v4.2.170210 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the reason and location fields of the visits listing page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://brackish.io/tutortrac-multiple-stored-xss/ - https://www.go-redrock.com/solutions/tutortrac/ - https://wiki.go-redrock.com/index.php/4.0_Recent_Changes No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5860.
CVE ID: CVE-2023-5860 Date Updated: 2024-08-02T08:14:24.593Z Date Published: 2023-11-02T11:00:50.449Z Description: The Icons Font Loader plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/12a9fbe8-445a-478a-b6ce-cd669ccb6a2d?source=cve - https://plugins.trac.wordpress.org/changeset/2987296/icons-font-loader No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1626.
CVE ID: CVE-2012-1626 Date Updated: 2024-08-06T19:01:02.861Z Date Published: 2012-09-20T01:00:00 Description: SQL injection vulnerability in the conversion form for Events in the Date module 6.x-2.x before 6.x-2.8 for Drupal allows remote authenticated users with the "administer Date Tools" privilege to execute arbitrary SQL commands via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://drupal.org/node/1401026 - http://secunia.com/advisories/47533 - http://www.openwall.com/lists/oss-security/2012/04/07/1 - http://osvdb.org/78261 - http://drupal.org/node/1401434 - https://exchange.xforce.ibmcloud.com/vulnerabilities/72356 - http://www.securityfocus.com/bid/51378 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5011.
CVE ID: CVE-2023-5011 Date Updated: 2024-08-02T07:44:53.684Z Date Published: 2023-12-20T15:57:19.012Z Description: Student Information System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'coursename' parameter of the marks.php resource does not validate the characters received and they are sent unfiltered to the database. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fluidattacks.com/advisories/kissin/ - https://www.kashipara.com/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27359.
CVE ID: CVE-2024-27359 Date Updated: 2024-08-05T18:01:32.049Z Date Published: 2024-02-25T00:00:00 Description: Certain WithSecure products allow a Denial of Service because the engine scanner can go into an infinite loop when processing an archive file. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, WithSecure Linux Security 64 12.0, WithSecure Linux Protection 12.0, and WithSecure Atlant 1.0.35-1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.withsecure.com/en/support/security-advisories/cve-2034-n1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-4136.
CVE ID: CVE-2009-4136 Date Updated: 2024-08-07T06:54:09.358Z Date Published: 2009-12-15T18:00:00 Description: PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.redhat.com/support/errata/RHSA-2010-0427.html - http://www.redhat.com/support/errata/RHSA-2010-0428.html - http://marc.info/?l=bugtraq&m=134124585221119&w=2 - http://www.securitytracker.com/id?1023326 - http://secunia.com/advisories/39820 - http://www.postgresql.org/docs/current/static/release-8-2-15.html - https://bugzilla.redhat.com/show_bug.cgi?id=546321 - https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01035.html - http://www.postgresql.org/support/security.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9358 - http://www.postgresql.org/docs/current/static/release-8-4-2.html - http://www.postgresql.org/docs/current/static/release-8-0-23.html - http://www.securityfocus.com/archive/1/509917/100/0/threaded - http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html - http://www.postgresql.org/docs/current/static/release-8-3-9.html - https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01056.html - http://www.mandriva.com/security/advisories?name=MDVSA-2009:333 - http://www.postgresql.org/docs/current/static/release-7-4-27.html - http://www.vupen.com/english/advisories/2009/3519 - http://osvdb.org/61039 - http://www.postgresql.org/docs/current/static/release-8-1-19.html - http://secunia.com/advisories/37663 - http://www.securityfocus.com/bid/37333 - http://www.redhat.com/support/errata/RHSA-2010-0429.html - http://marc.info/?l=bugtraq&m=134124585221119&w=2 - http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0012 - http://www.vupen.com/english/advisories/2010/1197 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1000010.
CVE ID: CVE-2015-1000010 Date Updated: 2024-08-06T08:58:26.622Z Date Published: 2016-10-06T14:00:00 Description: Remote file download in simple-image-manipulator v1.0 wordpress plugin No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/94563 - http://www.vapidlabs.com/advisory.php?v=147 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6019.
CVE ID: CVE-2016-6019 Date Updated: 2024-09-16T21:02:54.064Z Date Published: 2017-07-13T15:00:00Z Description: IBM Emptoris Strategic Supply Management Platform 10.0.0.x through 10.1.1.x is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 116739. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/116739 - http://www.securityfocus.com/bid/99589 - http://www.ibm.com/support/docview.wss?uid=swg22005839 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27621.
CVE ID: CVE-2023-27621 Date Updated: 2024-09-24T19:08:03.272Z Date Published: 2023-08-30T15:58:14.609Z Description: Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in MrDemonWolf Livestream Notice plugin <= 1.2.0 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/livestream-notice/wordpress-livestream-notice-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-5039.
CVE ID: CVE-2020-5039 Date Updated: 2021-01-05T18:30:29 Date Published: 2021-01-05T18:30:29 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5372.
CVE ID: CVE-2023-5372 Date Updated: 2024-08-23T18:58:04.490Z Date Published: 2024-01-30T00:55:33.090Z Description: The post-authentication command injection vulnerability in Zyxel NAS326 firmware versions through V5.21(AAZF.15)C0 and NAS542 firmware versions through V5.21(ABAG.12)C0 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands by sending a crafted query parameter attached to the URL of an affected device’s web management interface. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-vulnerability-in-nas-products-01-30-2024 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-35377.
CVE ID: CVE-2021-35377 Date Updated: 2024-08-04T00:33:51.292Z Date Published: 2023-03-06T00:00:00 Description: Cross Site Scripting vulnerability found in VICIdial v2.14-610c and v.2.10-415c allows attackers execute arbitrary code via the /agc/vicidial.php, agc/vicidial-greay.php, and /vicidial/KHOMP_admin.php parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://vicidial.com - https://www.vicidial.org/VICIDIALforum/viewtopic.php?f=2&t=41634 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10918.
CVE ID: CVE-2018-10918 Date Updated: 2024-08-05T07:54:35.460Z Date Published: 2018-08-22T17:00:00 Description: A null pointer dereference flaw was found in the way samba checked database outputs from the LDB database layer. An authenticated attacker could use this flaw to crash a samba server in an Active Directory Domain Controller configuration. Samba versions before 4.7.9 and 4.8.4 are vulnerable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.samba.org/samba/security/CVE-2018-10918.html - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918 - https://usn.ubuntu.com/3738-1/ - https://security.netapp.com/advisory/ntap-20180814-0001/ - http://www.securityfocus.com/bid/105083 - https://security.gentoo.org/glsa/202003-52 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-1382.
CVE ID: CVE-2014-1382 Date Updated: 2024-08-06T09:42:36.209Z Date Published: 2014-07-01T10:00:00 Description: WebKit, as used in Apple iOS before 7.1.2, Apple Safari before 6.1.5 and 7.x before 7.0.5, and Apple TV before 6.1.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-06-30-1, APPLE-SA-2014-06-30-3, and APPLE-SA-2014-06-30-4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/kb/HT6537 - http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html - http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html - http://secunia.com/advisories/59481 - http://www.securitytracker.com/id/1030495 - http://archives.neohapsis.com/archives/bugtraq/2014-06/0171.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.